DarthRa / LinuxMalwareSourceCode
This is a repository of the source code of various malware targeting the *nix (mostly Linux) operating systems.
☆12Updated 8 years ago
Alternatives and similar repositories for LinuxMalwareSourceCode:
Users that are interested in LinuxMalwareSourceCode are comparing it to the libraries listed below
- Reversed source code to the Babuk ransomware builder.☆17Updated 3 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆22Updated 6 years ago
- An advanced Ransomware with CryptoGraphy and all the stuff.☆7Updated 3 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 5 years ago
- Driver reverse engineering of the Russian Sandworm hacking group's BlackEnergy malware.☆13Updated 3 years ago
- legacy Botnets source code Forked from github.com/malwares☆21Updated 3 years ago
- Simple class to search and upload files☆26Updated 5 years ago
- ☆10Updated 2 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆57Updated 7 years ago
- Conti Ransomware Source Code☆20Updated 2 years ago
- Simple keylogger on C++ with several functions.☆16Updated 4 years ago
- Persistent & Undetectable Malware Backdoor☆28Updated 8 months ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆13Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆39Updated 8 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆29Updated 8 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 8 months ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆58Updated 7 years ago
- fully Undetectable payload generator for metasploit☆11Updated last year
- Fud Persistent Windows Backdoor developed purely in python☆29Updated 3 years ago
- Simple way to read wirte delete values from registry☆18Updated 5 years ago
- ClipBanker Spy Trojan☆11Updated 4 months ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Reversed source code of the Babuk Ransomware Version 1☆18Updated 3 years ago
- using VBS to download and install a powershell malware☆39Updated 5 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆32Updated 4 years ago